Analysis
-
max time kernel
147s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
27-11-2024 21:23
Static task
static1
Behavioral task
behavioral1
Sample
a9b26d76d855c2427813d22600ba797a_JaffaCakes118.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
a9b26d76d855c2427813d22600ba797a_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
a9b26d76d855c2427813d22600ba797a_JaffaCakes118.exe
-
Size
244KB
-
MD5
a9b26d76d855c2427813d22600ba797a
-
SHA1
8f5e4c29157bbe9691bf625ed5ea72a34cf86eec
-
SHA256
1eda80aaef0a7d3cdc41e4ad93dba17a5731ca77d9be6efb297634b135d6705f
-
SHA512
b98d10ead941c78dd30cc70d2f63133089d5619f0e529e33163b619fcaa6fde09a310c65d2ed6e68be3315e436501c2ac0d809690494266a39eecc3baa17e1da
-
SSDEEP
6144:Y2MeMBlZXpUHLO7OGCdU8Iz3zPobd8EEEEEEEEEEEEEEEEEEEO:Y8MBlgrO7OGseiu
Malware Config
Extracted
metasploit
encoder/fnstenv_mov
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Executes dropped EXE 10 IoCs
pid Process 5036 wingate32.exe 2208 wingate32.exe 4220 wingate32.exe 4660 wingate32.exe 632 wingate32.exe 4764 wingate32.exe 1736 wingate32.exe 3940 wingate32.exe 3168 wingate32.exe 3616 wingate32.exe -
Drops file in System32 directory 22 IoCs
description ioc Process File created C:\Windows\SysWOW64\wingate32.exe wingate32.exe File opened for modification C:\Windows\SysWOW64\wingate32.exe wingate32.exe File created C:\Windows\SysWOW64\wingate32.exe wingate32.exe File opened for modification C:\Windows\SysWOW64\wingate32.exe wingate32.exe File created C:\Windows\SysWOW64\wingate32.exe a9b26d76d855c2427813d22600ba797a_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\wingate32.exe wingate32.exe File opened for modification C:\Windows\SysWOW64\wingate32.exe wingate32.exe File created C:\Windows\SysWOW64\wingate32.exe wingate32.exe File created C:\Windows\SysWOW64\wingate32.exe wingate32.exe File opened for modification C:\Windows\SysWOW64\wingate32.exe wingate32.exe File created C:\Windows\SysWOW64\wingate32.exe wingate32.exe File created C:\Windows\SysWOW64\wingate32.exe wingate32.exe File opened for modification C:\Windows\SysWOW64\wingate32.exe wingate32.exe File opened for modification C:\Windows\SysWOW64\wingate32.exe wingate32.exe File created C:\Windows\SysWOW64\wingate32.exe wingate32.exe File created C:\Windows\SysWOW64\wingate32.exe wingate32.exe File opened for modification C:\Windows\SysWOW64\wingate32.exe a9b26d76d855c2427813d22600ba797a_JaffaCakes118.exe File created C:\Windows\SysWOW64\wingate32.exe wingate32.exe File opened for modification C:\Windows\SysWOW64\wingate32.exe wingate32.exe File created C:\Windows\SysWOW64\wingate32.exe wingate32.exe File opened for modification C:\Windows\SysWOW64\wingate32.exe wingate32.exe File opened for modification C:\Windows\SysWOW64\wingate32.exe wingate32.exe -
System Location Discovery: System Language Discovery 1 TTPs 11 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wingate32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wingate32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wingate32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a9b26d76d855c2427813d22600ba797a_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wingate32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wingate32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wingate32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wingate32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wingate32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wingate32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wingate32.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 4856 wrote to memory of 5036 4856 a9b26d76d855c2427813d22600ba797a_JaffaCakes118.exe 83 PID 4856 wrote to memory of 5036 4856 a9b26d76d855c2427813d22600ba797a_JaffaCakes118.exe 83 PID 4856 wrote to memory of 5036 4856 a9b26d76d855c2427813d22600ba797a_JaffaCakes118.exe 83 PID 5036 wrote to memory of 2208 5036 wingate32.exe 97 PID 5036 wrote to memory of 2208 5036 wingate32.exe 97 PID 5036 wrote to memory of 2208 5036 wingate32.exe 97 PID 2208 wrote to memory of 4220 2208 wingate32.exe 100 PID 2208 wrote to memory of 4220 2208 wingate32.exe 100 PID 2208 wrote to memory of 4220 2208 wingate32.exe 100 PID 4220 wrote to memory of 4660 4220 wingate32.exe 102 PID 4220 wrote to memory of 4660 4220 wingate32.exe 102 PID 4220 wrote to memory of 4660 4220 wingate32.exe 102 PID 4660 wrote to memory of 632 4660 wingate32.exe 103 PID 4660 wrote to memory of 632 4660 wingate32.exe 103 PID 4660 wrote to memory of 632 4660 wingate32.exe 103 PID 632 wrote to memory of 4764 632 wingate32.exe 104 PID 632 wrote to memory of 4764 632 wingate32.exe 104 PID 632 wrote to memory of 4764 632 wingate32.exe 104 PID 4764 wrote to memory of 1736 4764 wingate32.exe 105 PID 4764 wrote to memory of 1736 4764 wingate32.exe 105 PID 4764 wrote to memory of 1736 4764 wingate32.exe 105 PID 1736 wrote to memory of 3940 1736 wingate32.exe 106 PID 1736 wrote to memory of 3940 1736 wingate32.exe 106 PID 1736 wrote to memory of 3940 1736 wingate32.exe 106 PID 3940 wrote to memory of 3168 3940 wingate32.exe 107 PID 3940 wrote to memory of 3168 3940 wingate32.exe 107 PID 3940 wrote to memory of 3168 3940 wingate32.exe 107 PID 3168 wrote to memory of 3616 3168 wingate32.exe 108 PID 3168 wrote to memory of 3616 3168 wingate32.exe 108 PID 3168 wrote to memory of 3616 3168 wingate32.exe 108
Processes
-
C:\Users\Admin\AppData\Local\Temp\a9b26d76d855c2427813d22600ba797a_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a9b26d76d855c2427813d22600ba797a_JaffaCakes118.exe"1⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4856 -
C:\Windows\SysWOW64\wingate32.exeC:\Windows\system32\wingate32.exe 1160 "C:\Users\Admin\AppData\Local\Temp\a9b26d76d855c2427813d22600ba797a_JaffaCakes118.exe"2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5036 -
C:\Windows\SysWOW64\wingate32.exeC:\Windows\system32\wingate32.exe 1152 "C:\Windows\SysWOW64\wingate32.exe"3⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2208 -
C:\Windows\SysWOW64\wingate32.exeC:\Windows\system32\wingate32.exe 1124 "C:\Windows\SysWOW64\wingate32.exe"4⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4220 -
C:\Windows\SysWOW64\wingate32.exeC:\Windows\system32\wingate32.exe 1136 "C:\Windows\SysWOW64\wingate32.exe"5⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4660 -
C:\Windows\SysWOW64\wingate32.exeC:\Windows\system32\wingate32.exe 1140 "C:\Windows\SysWOW64\wingate32.exe"6⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:632 -
C:\Windows\SysWOW64\wingate32.exeC:\Windows\system32\wingate32.exe 1144 "C:\Windows\SysWOW64\wingate32.exe"7⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4764 -
C:\Windows\SysWOW64\wingate32.exeC:\Windows\system32\wingate32.exe 1148 "C:\Windows\SysWOW64\wingate32.exe"8⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1736 -
C:\Windows\SysWOW64\wingate32.exeC:\Windows\system32\wingate32.exe 1156 "C:\Windows\SysWOW64\wingate32.exe"9⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3940 -
C:\Windows\SysWOW64\wingate32.exeC:\Windows\system32\wingate32.exe 1164 "C:\Windows\SysWOW64\wingate32.exe"10⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3168 -
C:\Windows\SysWOW64\wingate32.exeC:\Windows\system32\wingate32.exe 1168 "C:\Windows\SysWOW64\wingate32.exe"11⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:3616
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
244KB
MD5a9b26d76d855c2427813d22600ba797a
SHA18f5e4c29157bbe9691bf625ed5ea72a34cf86eec
SHA2561eda80aaef0a7d3cdc41e4ad93dba17a5731ca77d9be6efb297634b135d6705f
SHA512b98d10ead941c78dd30cc70d2f63133089d5619f0e529e33163b619fcaa6fde09a310c65d2ed6e68be3315e436501c2ac0d809690494266a39eecc3baa17e1da